Thanks for the suggestion.
What's my best bet for using it on OS X? Can I use it with QEMU
running a Mac virtual machine on OS X? I'm looking to create a work
environment I'd be happy using every day, so switching over to linux
or XP isn't really in the cards.
What about the Parallels v
Hi Holmes,
You might want to take a look at Tor VM. It is a transparent solution for
Tor that works with any TCP based application.
http://www.janusvm.com/tor_vm/
- Kyle
On Fri, Jan 2, 2009 at 10:21 AM, Holmes Wilson wrote:
> Hi everybody,
>
> Does anyone know how to "torify" a desktop bloggi
Hi everybody,
Does anyone know how to "torify" a desktop blogging tool like ecto?
http://illuminex.com/ecto/
http://codex.wordpress.org/XML-RPC_Support
http://code.google.com/apis/blogger/
Can I just point it to privoxy/blog.com and rest assured that all
communication is anonymous through to
Also, make sure you have an application firewall to stop DNS leaks and plugins from taking your anonymity away.On 11/15/06, Jeffrey F. Bloss <
[EMAIL PROTECTED]> wrote:RMS wrote:> > > If you don't enable hide-forwarded-for-headers you are sending
> > > your client's IP address to the web server. If
RMS wrote:
> > > If you don't enable hide-forwarded-for-headers you are sending
> > > your client's IP address to the web server. If you aren't using
> > > NAT, this will obviously affect your anonymity.
> >
> > If you're running Privoxy on the machine you are using to browse,
> > and you're conne
RMS <[EMAIL PROTECTED]> wrote:
> > > If you don't enable hide-forwarded-for-headers you are sending your
> > > client's IP address to the web server. If you aren't using NAT,
> > > this will obviously affect your anonymity.
> >
> > If you're running Privoxy on the machine you are using to browse,
> If you don't enable hide-forwarded-for-headers you are sending your
> client's IP address to the web server. If you aren't using NAT,
> this will obviously affect your anonymity.
If you're running Privoxy on the machine you are using to browse, and
you're connecting using the address "127.0.0.1
On Nov 15, 2006, at 10:47:56, Fabian Keil wrote:
If you don't enable hide-forwarded-for-headers you are sending your
client's IP address to the web server. If you aren't using NAT,
this will obviously affect your anonymity.
If you're running Privoxy on the machine you are using to browse, and
Also, it would be more logical instead of having this convoluted camera
setup (which can be defeated by editing the contents of the tape) to
get a very cheap laptop to do all your questionable work on. Then, you
can always have it with you to ensure that the data isn't modified. I
would also like t
RMS <[EMAIL PROTECTED]> wrote:
> Thanks for all the reply. I will consider using some of the mentioned
> techniques, maybe a live-cd to defeat key logger.
Remember that a LiveCD doesn't protect you against hardware key loggers.
> I am currently using Privoxy with Tor on Windows XP to make my
>
Hi everyone
Thanks for all the reply. I will consider using some of the mentioned
techniques, maybe a live-cd to defeat key logger. I like to ask
another factor that may affects one's anonymous status.
I am currently using Privoxy with Tor on Windows XP to make my
connection anonymous. As I do n
To:
> Sent: Tuesday, November 14, 2006 9:33 PM
> Subject: Re: Anonymous Blogging
>
>
> >
> > - getting a legal warrant to install a keylogger on your computer;
> > - installing a keylogger on your computer illegally.
> >
>
> Your security should be an ove
mber 14, 2006 9:33 PM
Subject: Re: Anonymous Blogging
- getting a legal warrant to install a keylogger on your computer;
- installing a keylogger on your computer illegally.
Your security should be an overall matter, where Tor is only for your
internet security. The approach for safi
>
> - getting a legal warrant to install a keylogger on your computer;
> - installing a keylogger on your computer illegally.
>
Your security should be an overall matter, where Tor is only for your
internet security. The approach for safing the computer place differ
according to the environ
On Wed, Nov 15, 2006 at 12:14:38AM +0800, RMS wrote:
> Dear all
>
> I like to ask what is the encryption level for Tor? I cannot find it
> despite searching. Is it better than Gmail's AES-256 256bit?
You can find full details about Tor's protocol at
http://tor.eff.org/svn/trunk/doc/tor-spec.t
Dear all
I like to ask what is the encryption level for Tor? I cannot find it
despite searching. Is it better than Gmail's AES-256 256bit?
Regards
Kees Vonk wrote:
> This reminded me of question I was toying with the other day: If the
> exit node of a circuit was in the same country as the computer of
> origin, it would seemingly be relatively easy to match traffic send to
> the circuit entry node with the traffic emerging from the exit node
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Indeed, this is not very unlikely, I wrote a short article about how
trojans/keyloggers might be used legaly by the government in the future:
http://www.anti1984.com/en/articles/2.html
Who knows, someday it might not just be used for the average crim
> TOR is *not* designed to protect against a global passive adversary.
> The US government is certainly capable of being that, now would they
> put that much effort into you personally, who's to say.
If the police forces of the country where you live wants to find out
about your online activities,
I had asked that question before and somebody provided a script, search
the archives. I would also like to add that the "great firewall of
China" is not very centralized and as a result such an attack would
prove fatal. Does anybody have any information about how censorship in
other countries works
Paul Syverson wrote:
> On Mon, Nov 13, 2006 at 06:55:06PM +0800, RMS wrote:
>> I am a political blogger in a sensitive country and I would like to
>> try out TOR to make my blogging anonymous, as recommended by Reporter
>> Without Borders (RSF) in their handbook. I understand that with TOR,
>> ther
On Mon, Nov 13, 2006 at 06:55:06PM +0800, RMS wrote:
>
> I am a political blogger in a sensitive country and I would like to
> try out TOR to make my blogging anonymous, as recommended by Reporter
> Without Borders (RSF) in their handbook. I understand that with TOR,
> there is little chance of th
Hi,
I'd highly recommend reading teh "Design Documents" at
http://tor.eff.org/documentation.html.en
TOR is *not* designed to protect against a global passive adversary.
The US government is certainly capable of being that, now would they
put that much effort into you personally, who's to say.
T
> I am a political blogger in a sensitive country and I would like to
> try out TOR to make my blogging anonymous, as recommended by Reporter
> Without Borders (RSF) in their handbook. I understand that with TOR,
> there is little chance of the government tracing my original IP
> address when blogg
On Mon, Nov 13, 2006 at 06:55:06PM +0800, RMS wrote:
> I am a political blogger in a sensitive country and I would like to
> try out TOR to make my blogging anonymous, as recommended by Reporter
> Without Borders (RSF) in their handbook. I understand that with TOR,
> there is little chance of the
Hi all!
I am a political blogger in a sensitive country and I would like to
try out TOR to make my blogging anonymous, as recommended by Reporter
Without Borders (RSF) in their handbook. I understand that with TOR,
there is little chance of the government tracing my original IP
address when blogg
26 matches
Mail list logo